Archive for the 'FBI' Category



Cluelessness Regarding What’s At Stake In The Apple Versus FBI Fight

BY Herschel Smith
3 months, 1 week ago

techdirt:

I guess this isn’t that surprising, but as the big legal fight heated up this week between Apple and the Justice Department over whether or not Apple can be forced to create a backdoor to let the FBI access the contents of Syed Farook’s iPhone, all of the major Presidential candidates have weighed in… and they’re all wrong. Donald Trump is getting the most attention. Starting earlier this week he kept saying that Apple should just do what the FBI wants, and then he kicked it up a notch this afternoon saying that everyone should boycott Apple until it gives in to the FBI. Apparently, Trump doesn’t even have the first clue about the actual issue at stake, in terms of what a court can compel a company to do, and what it means for our overall security.

This isn’t another Trump-bashing post.  I’ve had my share, and it’s so easy.  But in this case, every other presidential candidate – every other presidential candidate – is close to being as bad on the issue, and lacks even a basic clue as to what’s at stake.

There is also misunderstanding within the field who purports to comprehend the technology of the issue.  This post at Zero Hedge is an example.

On the surface, this appears like valiant attempt by the CEO of the world’s most valuable company to stand up against the Big Brother state made so famous in the aftermath of the Edward Snowden revelations.

However, a quick peek beneath the surface reveals something far less noble and makes Tim Cook seem like you average, if very cunning, smartphone salesman.

According to the The Daily Beast’s Shane Harris, in a similar case in New York last year, Apple acknowledged that it could extract such data if it wanted to. But the real shocker is that according to prosecutors in that case, Apple has unlocked phones for authorities at least 70 times since 2008. (Apple doesn’t dispute this figure.)

As Harris observantly adds, “in other words, Apple’s stance in the San Bernardino case may not be quite the principled defense that Cook claims it is.”

To this, my oldest son Josh sends the following.

He doesn’t understand the subject matter. He’s in over his head and backing in to a predisposition.

Apple was unlocking phones years ago, when security feature such as system-wide encryption hadn’t been implemented. It was a different kind of “unlocking.” This isn’t a fight over keys to a single device. This is a fight over encryption, which the government doesn’t want any of us to have, because the government is run by political science and history majors.

Of note is the fact that any device from the 4th generation forward (beginning with 5s) is impossible – IMPOSSIBLE – to decrypt without the actual key, because Apple has moved encryption duties to a separate System On A Chip (SoC) that runs its own OS, is married to the device by UUID, and totally inaccessible.

The phone the FBI is freaking out over is a 5c, not a 5s.

The FBI doesn’t need the phone. They have what they need already. This is about encryption. The government needs an event they can point to and blame for encryption, and they’ve chosen this one.

This is the politics of control and power. To categorize it as a publicity stunt is disingenuous to the point of being dangerous.

Note that we’ve discussed here and here the weaknesses in random number generators and the ability to hone in on keys, but Apple has a feature that cuts the entire system off and erases data if this approach is tried beyond just a few random numbers.

Concerning this report, Josh also send the following.

The phone was in the possession of the San Bernardino County Department of Public Health in the hours after the attack. An idiot IT worker with the department performed a remote reset of the iCloud account attached to the device.

This disabled an assortment of services and functions on the phone, including automatic backups to iCloud, which the FBI seems to think would have been helpful, even though they’re also encrypted.

They’re fixating.

Bottom line.  The fedgov has not asked for Apple to break into this phone.  They have asked Apple to develop an approach that allows them to completely bypass all security, thus making them malleable to a FISA court ruling for any or all phones in the future.

All of your worst suspicions are true.  This is the government at its most totalitarian.

We’re All Under Surveillance

BY Herschel Smith
3 years, 5 months ago

We’re all under surveillance.

The FBI has the e-mails of nearly all US citizens, including congressional members, according to NSA whistleblower William Binney. Speaking to RT he warned that the government can use information against anyone it wants.

­One of the best mathematicians and code breakers in NSA history resigned in 2001 because he no longer wanted to be associated with alleged violations of the constitution.

He asserts, that the FBI has access to this data due to a powerful device Naris.

This year Binney received the Callaway award. The annual award was established to recognize those, who stand out for constitutional rights and American values at great risk to their personal or professional lives.

RT: In light of the Petraeus/Allen scandal while the public is so focused on the details of their family drama one may argue that the real scandal in this whole story is the power, the reach of the surveillance state. I mean if we take General Allen – thousands of his personal e-mails have been sifted through private correspondence. It’s not like any of those men was planning an attack on America. Does the scandal prove the notion that there is no such thing as privacy in a surveillance state?

William Binney: Yes, that’s what I’ve been basically saying for quite some time, is that the FBI has access to the data collected, which is basically the e-mails of virtually everybody in the country. And the FBI has access to it. All the congressional members are on the surveillance too, no one is excluded. They are all included. So, yes, this can happen to anyone. If they become a target for whatever reason – they are targeted by the government, the government can go in, or the FBI, or other agencies of the government, they can go into their database, pull all that data collected on them over the years, and we analyze it all. So, we have to actively analyze everything they’ve done for the last 10 years at least.

And here I thought that maybe our government would be doing needful things like finding and shutting down MS-13, and preparing for Hezbollah sleeper cells inside the U.S. to become operational.

It’s really we, the citizens, who are the biggest threat to the country.  See how much I know?  I wouldn’t have guessed it.

FBI Tags: ,

26th MEU (10)
Abu Muqawama (12)
ACOG (2)
ACOGs (1)
Afghan National Army (36)
Afghan National Police (17)
Afghanistan (677)
Afghanistan SOFA (4)
Agriculture in COIN (3)
AGW (1)
Air Force (29)
Air Power (9)
al Qaeda (83)
Ali al-Sistani (1)
America (7)
Ammunition (22)
Animals in War (4)
Ansar al Sunna (15)
Anthropology (3)
Antonin Scalia (1)
AR-15s (61)
Arghandab River Valley (1)
Arlington Cemetery (2)
Army (41)
Assassinations (2)
Assault Weapon Ban (26)
Australian Army (5)
Azerbaijan (4)
Backpacking (2)
Badr Organization (8)
Baitullah Mehsud (21)
Basra (17)
BATFE (49)
Battle of Bari Alai (2)
Battle of Wanat (17)
Battle Space Weight (3)
Bin Laden (7)
Blogroll (2)
Blogs (5)
Body Armor (17)
Books (2)
Border War (7)
Brady Campaign (1)
Britain (27)
British Army (35)
Camping (4)
Canada (2)
Castle Doctrine (1)
Caucasus (6)
CENTCOM (7)
Center For a New American Security (8)
Charity (3)
China (10)
Christmas (8)
CIA (12)
Civilian National Security Force (3)
Col. Gian Gentile (9)
Combat Outposts (3)
Combat Video (2)
Concerned Citizens (6)
Constabulary Actions (3)
Coolness Factor (2)
COP Keating (4)
Corruption in COIN (4)
Council on Foreign Relations (1)
Counterinsurgency (215)
DADT (2)
David Rohde (1)
Defense Contractors (2)
Department of Defense (122)
Department of Homeland Security (13)
Disaster Preparedness (2)
Distributed Operations (5)
Dogs (6)
Drone Campaign (3)
EFV (3)
Egypt (12)
El Salvador (1)
Embassy Security (1)
Enemy Spotters (1)
Expeditionary Warfare (17)
F-22 (2)
F-35 (1)
Fallujah (17)
Far East (3)
Fathers and Sons (1)
Favorite (1)
Fazlullah (3)
FBI (2)
Featured (176)
Federal Firearms Laws (16)
Financing the Taliban (2)
Firearms (422)
Football (1)
Force Projection (35)
Force Protection (4)
Force Transformation (1)
Foreign Policy (27)
Fukushima Reactor Accident (6)
Ganjgal (1)
Garmsir (1)
general (14)
General Amos (1)
General James Mattis (1)
General McChrystal (39)
General McKiernan (6)
General Rodriguez (3)
General Suleimani (7)
Georgia (19)
GITMO (2)
Google (1)
Gulbuddin Hekmatyar (1)
Gun Control (378)
Guns (902)
Guns In National Parks (3)
Haditha Roundup (10)
Haiti (2)
HAMAS (7)
Haqqani Network (9)
Hate Mail (7)
Hekmatyar (1)
Heroism (4)
Hezbollah (12)
High Capacity Magazines (11)
High Value Targets (9)
Homecoming (1)
Homeland Security (1)
Horses (1)
Humor (13)
ICOS (1)
IEDs (7)
Immigration (45)
India (10)
Infantry (3)
Information Warfare (2)
Infrastructure (2)
Intelligence (22)
Intelligence Bulletin (6)
Iran (169)
Iraq (378)
Iraq SOFA (23)
Islamic Facism (38)
Islamists (55)
Israel (18)
Jaish al Mahdi (21)
Jalalabad (1)
Japan (2)
Jihadists (75)
John Nagl (5)
Joint Intelligence Centers (1)
JRTN (1)
Kabul (1)
Kajaki Dam (1)
Kamdesh (9)
Kandahar (12)
Karachi (7)
Kashmir (2)
Khost Province (1)
Khyber (11)
Knife Blogging (2)
Korea (4)
Korengal Valley (3)
Kunar Province (20)
Kurdistan (3)
Language in COIN (5)
Language in Statecraft (1)
Language Interpreters (2)
Lashkar-e-Taiba (2)
Law Enforcement (2)
Lawfare (6)
Leadership (5)
Lebanon (6)
Leon Panetta (2)
Let Them Fight (2)
Libya (14)
Lines of Effort (3)
Littoral Combat (8)
Logistics (49)
Long Guns (1)
Lt. Col. Allen West (2)
Marine Corps (239)
Marines in Bakwa (1)
Marines in Helmand (67)
Marjah (4)
MEDEVAC (2)
Media (23)
Memorial Day (2)
Mexican Cartels (23)
Mexico (30)
Michael Yon (5)
Micromanaging the Military (7)
Middle East (1)
Military Blogging (26)
Military Contractors (3)
Military Equipment (24)
Militia (3)
Mitt Romney (3)
Monetary Policy (1)
Moqtada al Sadr (2)
Mosul (4)
Mountains (10)
MRAPs (1)
Mullah Baradar (1)
Mullah Fazlullah (1)
Mullah Omar (3)
Musa Qala (4)
Music (16)
Muslim Brotherhood (6)
Nation Building (2)
National Internet IDs (1)
National Rifle Association (17)
NATO (15)
Navy (20)
Navy Corpsman (1)
NCOs (3)
News (1)
NGOs (2)
Nicholas Schmidle (2)
Now Zad (19)
NSA (1)
NSA James L. Jones (6)
Nuclear (53)
Nuristan (8)
Obama Administration (216)
Offshore Balancing (1)
Operation Alljah (7)
Operation Khanjar (14)
Ossetia (7)
Pakistan (165)
Paktya Province (1)
Palestine (5)
Patriotism (6)
Patrolling (1)
Pech River Valley (11)
Personal (27)
Petraeus (14)
Pictures (1)
Piracy (13)
Pistol (2)
Police (194)
Police in COIN (3)
Policy (15)
Politics (232)
Poppy (2)
PPEs (1)
Prisons in Counterinsurgency (12)
Project Gunrunner (20)
PRTs (1)
Qatar (1)
Quadrennial Defense Review (2)
Quds Force (13)
Quetta Shura (1)
RAND (3)
Recommended Reading (14)
Refueling Tanker (1)
Religion (105)
Religion and Insurgency (19)
Reuters (1)
Rick Perry (4)
Rifles (1)
Roads (4)
Rolling Stone (1)
Ron Paul (1)
ROTC (1)
Rules of Engagement (74)
Rumsfeld (1)
Russia (28)
Sabbatical (1)
Sangin (1)
Saqlawiyah (1)
Satellite Patrols (2)
Saudi Arabia (4)
Scenes from Iraq (1)
Second Amendment (154)
Second Amendment Quick Hits (2)
Secretary Gates (9)
Sharia Law (3)
Shura Ittehad-ul-Mujahiden (1)
SIIC (2)
Sirajuddin Haqqani (1)
Small Wars (72)
Snipers (9)
Sniveling Lackeys (2)
Soft Power (4)
Somalia (8)
Sons of Afghanistan (1)
Sons of Iraq (2)
Special Forces (24)
Squad Rushes (1)
State Department (17)
Statistics (1)
Sunni Insurgency (10)
Support to Infantry Ratio (1)
Supreme Court (1)
Survival (12)
SWAT Raids (53)
Syria (38)
Tactical Drills (1)
Tactical Gear (1)
Taliban (167)
Taliban Massing of Forces (4)
Tarmiyah (1)
TBI (1)
Technology (16)
Tehrik-i-Taliban (78)
Terrain in Combat (1)
Terrorism (92)
Thanksgiving (5)
The Anbar Narrative (23)
The Art of War (5)
The Fallen (1)
The Long War (20)
The Surge (3)
The Wounded (13)
Thomas Barnett (1)
Transnational Insurgencies (5)
Tribes (5)
TSA (12)
TSA Ineptitude (10)
TTPs (1)
U.S. Border Patrol (5)
U.S. Border Security (13)
U.S. Sovereignty (14)
UAVs (2)
UBL (4)
Ukraine (3)
Uncategorized (41)
Universal Background Check (3)
Unrestricted Warfare (4)
USS Iwo Jima (2)
USS San Antonio (1)
Uzbekistan (1)
V-22 Osprey (4)
Veterans (2)
Vietnam (1)
War & Warfare (210)
War & Warfare (40)
War Movies (3)
War Reporting (18)
Wardak Province (1)
Warriors (6)
Waziristan (1)
Weapons and Tactics (57)
West Point (1)
Winter Operations (1)
Women in Combat (17)
WTF? (1)
Yemen (1)

about · archives · contact · register

Copyright © 2006-2016 Captain's Journal. All rights reserved.